Securing Existing Software using Formally Verified Libraries

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=Taxx6Iuedqk



Duration: 0:00
0 views
0


FOSDEM 2020 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-07-20Prototyping the Internet of Things with Wyliodrin STUDIO An open source platform for building IoT p…
2022-07-20Quantum Open Source Foundation
2022-07-20ROS2 The evolution of Robot Operative System
2022-07-20seL4 Microkernel Status Update
2022-07-20Relax and Recover ReaR Mass Deployment
2022-07-20Protecting plain'text secrets in configuration files
2022-07-20Port luajit to RISC V Motivation, first steps and perspectives
2022-07-20Protect your data objects, not your network connections Good news for a paradigm shift
2022-07-20Quantum machine learning with PennyLane
2022-07-20Spacks new Concretizer Dependency solving is more than just SAT
2022-07-20Securing Existing Software using Formally Verified Libraries
2022-07-20Rook Cloud Native Storage for Kubernetes Overview and what is new about Rook
2022-07-20Poio Predictive Text Grassroots Technology for Language Diversity
2022-07-20Quantum Game with Photons Tensors in TypeScript, Visualized
2022-07-20Some Excerpts from the Theory of Design in Architecture
2022-07-20Secure logging with syslog ng Forward integrity and confidentiality of system logs
2022-07-20RISC V Software and Firmware Development in the Cloud Using OpenPitonAriane on Amazon F1
2022-07-20Relax and Recover ReaR Basics with Demo on Real Hardware
2022-07-20Podman The Powerful Container Multi Tool An use case driven hands on to the container management …
2022-07-20Protect Sensitive Data with Ada Keystore
2022-07-20Software distribution new points of failure In a censored world